top of page

PRIVACY & INFORMATION SECURITY

LESSON PLAN

Smart Device, Smart Security

How smart is your device?

TOPIC

PRIVACY & INFORMATION SECURITY

RECOMMENDED AGE

AGE 12

LESSON DURATION

30 MIN

LEARNING OBJECTIVES

Students will be able to:

  • Identify IoT devices that are connected to the internet

  • Implement basic security measures for personal smart devices, such as passwords and regular updates

KEY CONCEPTS

This lesson plan by Cyberlite.org is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Teacher's Guide

Overview for Teachers

This lesson teaches students about the Internet of Things (IoT) devices, the cyber risks associated with these devices, and how to ensure their security.


 
Slide 1

Welcome students to the lesson and briefly explain that today’s lesson is about smart devices and how gadgets that are connected to the internet might post security risks.


 
Slide 2

Share the lesson objectives of what students will be learning today.


 
Slide 3

Encourage students to think about what makes a device "smart" by discussing examples like smartphones and smartwatches.


 
Slide 4

Explain the concept of the Internet of Things (IoT) using simple examples, highlighting how these devices connect and communicate via the internet.


 
Slide 5

Discuss the importance of keeping these smart devices secure to protect personal information from unauthorised access by bad actors.


 
Slide 6

Engage students in a brainstorming session to list as many internet-connected devices as they can think of, fostering awareness of the extensive presence of IoT in their lives.


 
Slide 7

Highlight why IoT devices require protection, mentioning their constant internet connection makes them attractive targets for hackers.


 
Slide 8

Kick off with a discussion on various smart devices students are familiar with, emphasising how these gadgets make daily tasks easier but also pose security risks. Highlight why IoT devices require protection, mentioning their constant internet connection makes them attractive targets for hackers.


 
Slide 9

Share practical tips for securing IoT devices, such as regular software updates, using strong passwords, and being cautious about the personal information shared through these devices.


 
Slide 10

Introduce an interactive activity where students identify potential IoT devices in different settings that could be vulnerable to hacking attempts.


 
Slide 11

Conduct the detective activity with illustrations of different environments (living room, kitchen, classroom), asking students to spot IoT devices and discuss their security implications.


 
Slide 12-13

The three IoT devices in the living room are:

  1. Smart TV

  2. Smart phone

  3. Gaming console


 
Slide 14-15

The three IoT devices in the kitchen are:

  1. Smart refrigerator

  2. Smart home assistant

  3. Robot vacuum

 
Slide 16-17

The three IoT devices in the classroom are:

  1. Smart interactive whiteboard

  2. Computers

  3. Security camera

 
Slide 18

Summarise the lesson's key points, and encourage students to share what they learned about protecting their smart devices.


 
Slide 19

Close with a reminder of the importance of maintaining smart security for smart devices, likening responsible IoT device management to being a "superhero" for their digital world.


 
Slide 20

Congratulate the students for their thoughtful participation and remind them to stay safe online!

 

bottom of page